steg abst
TRANSCRIPT
-
8/2/2019 steg abst
1/6
Steganography (Download Full Report And Abstract)
INTRODUCTION
Steganography
comes from the
Greek and literallymeans, "Covered
writing". It is one
of various data
hiding techniques,
which aims at
transmitting a
message on a
channel where
some other kind of
information is
already being
transmitted. This
distinguishes
steganography
from covert
channel
techniques, which
instead of trying
to transmit data
between two
entities that wereunconnected
before.
The goal of
steganography is
to hide messages
inside other
harmless
messages in a way
that does not
allow any enemy
to even detect thatthere is a second
secret message
present. The only
missing
information for
the enemy is the
short easily
exchangeable
random number
sequence, the
secret key,without the secret
-
8/2/2019 steg abst
2/6
key, the enemy
should not have
the slightest
chance of even
becoming
suspicious that onan observed
communication
channel, hidden
communication
might take place.
Steganography is
closely related to
the problem of
hidden channels n
secure operating
system design, aterm which refers
to all
communication
paths that cannot
easily be restricted
by access control
mechanisms. In an
ideal world we
would all be able
to sent openly
encrypted mail or
files to each other
with no fear of
reprisals. However
there are often
cases when this is
possible, either
because the
working company
does not allow
encrypted email orthe local
government does
not approve of
encrypt
communication (a
reality in some
parts of the
world). This is
where
steganography can
come into play.
-
8/2/2019 steg abst
3/6
Data hiding
techniques can
also be classified
with respect to the
extraction process:
Cover Escrow
methods need both
the original piece
of information and
the encoded one in
order to extract
the embedded
data.
Blind or Oblivious
schemes can
recover the hiddenmessage by means
only of the
encoded data.
Steganography
has developed a
lot in recent years,
because digital
techniques allow
new ways of
hiding
informations
inside other
informations, and
this can be
valuable in a lot of
situations. The
first to employ
hidden
communications
techniques -withradio
transmissions-
were the armies,
because of the
strategic
importance of
secure
communication
and the need to
conceal the source
as much aspossible.
-
8/2/2019 steg abst
4/6
Nowadays, new
constraints in
using strong
encryption for
messages are
added byinternational laws,
so if two peers
want to use it,
they can resort in
hiding the
communication
into casual
looking data. This
problem has
become more and
more importantjust in these days,
after the
international
Wassenaar
agreement, with
which around
thirty of the major
- with respect to
technology -
countries in the
world decided to
apply restrictions
in cryptography
export similar to
the USs ones.
Another
application of
steganography is
the protection of
sensitive data. A
file system can behidden in random
looking files in a
hard disk, needing
a key to extract
the original files.
This can protect
from physical
attacks to people
in order to get
their passwords,
because maybe theattacker cant
-
8/2/2019 steg abst
5/6
even know that
some files are in
that disk.
The major concern
of steganography
is stealth, becauseif an attacker,
either passive or
active, can detect
the presence of the
message, from
that point he can
try to extract it
and, if encrypted,
to decrypt it. The
resistance to
attempt atdestruction or
noise is not
required, since we
consider the
sender and the
receiver equally
interested in
exchanging
messages, so that
they will try to
transmit the stego-
medium in the
best way they can.
If the stego-data
can be transmitted
over the selected
channel, and this
is usually the case
with all the media
that are used, like
images or sounds,then the embedded
data will be
preserved along
with them. Thus,
data hiding
techniques for
steganography
must focus on the
maximum strength
against detection
and extraction.As a second
-
8/2/2019 steg abst
6/6
request, we would
prefer a high data
rate, because we
will usually want
to be able to
exchange anyamount of data,
from simple
messages to top
secret images.
Reference:http://www.seminarprojects.com/Thread-steganography-download-full-report-
and-abstract#ixzz1n8a87TbG
http://www.seminarprojects.com/Thread-steganography-download-full-report-and-abstract#ixzz1n8a87TbGhttp://www.seminarprojects.com/Thread-steganography-download-full-report-and-abstract#ixzz1n8a87TbGhttp://www.seminarprojects.com/Thread-steganography-download-full-report-and-abstract#ixzz1n8a87TbGhttp://www.seminarprojects.com/Thread-steganography-download-full-report-and-abstract#ixzz1n8a87TbGhttp://www.seminarprojects.com/Thread-steganography-download-full-report-and-abstract#ixzz1n8a87TbGhttp://www.seminarprojects.com/Thread-steganography-download-full-report-and-abstract#ixzz1n8a87TbG